You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,12 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 02/09/2022
9
+
ms.date: 02/15/2022
10
10
11
11
ms.author: justinha
12
12
author: vimrang
13
13
manager: daveba
14
-
ms.reviewer: tommma
14
+
ms.reviewer: vimrang
15
15
16
16
ms.collection: M365-identity-device-management
17
17
ms.custom: has-adal-ref
@@ -49,7 +49,9 @@ Let's cover each step:
49
49
50
50
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-alt.png" alt-text="Screenshot of the Sign-in if FIDO2 is also enabled.":::
51
51
52
-
1. After the user clicks the link, the client is redirected to the certauth endpoint [http://certauth.login.microsoftonline.com](http://certauth.login.microsoftonline.com). The endpoint performs mutual authentication and requests the client certificate as part of the TLS handshake. You will see an entry for this request in the Sign-in logs. There is a [known issue](#known-issues) where User ID is displayed instead of Username.
52
+
1. After the user clicks the link, the client is redirected to the certauth endpoint, which is [http://certauth.login.microsoftonline.com](http://certauth.login.microsoftonline.com) for Azure Global. For [Azure Government](/azure-government/compare-azure-government-global-azure.md#guidance-for-developers), the certauth endpoint is [http://certauth.login.microsoftonline.us](http://certauth.login.microsoftonline.us). For the correct endpoint for other environments, see the specific Microsoft cloud docs.
53
+
54
+
The endpoint performs mutual authentication and requests the client certificate as part of the TLS handshake. You will see an entry for this request in the Sign-in logs. There is a [known issue](#known-issues) where User ID is displayed instead of Username.
53
55
54
56
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png" alt-text="Screenshot of the Sign-in log in Azure AD." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png":::
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/workbook-cross-tenant-access-activity.md
+18-2Lines changed: 18 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.service: active-directory
12
12
ms.topic: reference
13
13
ms.workload: identity
14
14
ms.subservice: report-monitor
15
-
ms.date: 02/04/2022
15
+
ms.date: 02/14/2022
16
16
ms.author: mimart
17
17
18
18
ms.collection: M365-identity-device-management
@@ -45,7 +45,23 @@ This workbook has four sections:
45
45
46
46
- Individual users for inbound and outbound collaboration by tenant ID
47
47
48
-

48
+
The total number of external tenants that have had cross-tenant access activity with your tenant is shown at the top of the workbook.
49
+
50
+
Under **Step 1**, the external tenant list shows all the tenants that have had inbound or outbound activity with your tenant. When you select an external tenant in the table, the remaining sections update with information about outbound and inbound activity for that tenant.
51
+
52
+
[](./media/workbook-cross-tenant-access-activity/cross-tenant-workbook-step-1.png#lightbox)
53
+
54
+
The table under **Step 2** summarizes all outbound and inbound sign-in activity for the selected tenant, including the number of successful sign-ins and the resons for failed sign-ins. You can select **Outbound activity** or **Inbound activity** to update the remaining sections of the workbook with the type of activity you want to view.
55
+
56
+

57
+
58
+
Under **Step 3**, the table lists the applications that are being accessed across tenants. If you selected **Outbound activity** in the previous section, the table shows the applications in external tenants that are being accessed by your users. If you selected **Inbound activity**, you'll see the list of your applications that are being accessed by external users. You can select a row to find out which users are accessing that application.
59
+
60
+

61
+
62
+
The table in **Step 4** displays the list of users who are accessing the application you selected.
63
+
64
+

Copy file name to clipboardExpand all lines: articles/app-service/app-service-web-nodejs-best-practices-and-troubleshoot-guide.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ This setting controls the directory where iisnode logs stdout/stderr. The defaul
51
51
52
52
### debuggerExtensionDll
53
53
54
-
This setting controls what version of node-inspector iisnode uses when debugging your node application. Currently, iisnode-inspector-0.7.3.dll and iisnode-inspector.dll are the only two valid values for this setting. The default value is iisnode-inspector-0.7.3.dll. The iisnode-inspector-0.7.3.dll version uses node-inspector-0.7.3 and uses web sockets. Enable web sockets on your Azure webapp to use this version. See <https://ranjithblogs.azurewebsites.net/?p=98> for more details on how to configure iisnode to use the new node-inspector.
54
+
This setting controls what version of node-inspector iisnode uses when debugging your node application. Currently, iisnode-inspector-0.7.3.dll and iisnode-inspector.dll are the only two valid values for this setting. The default value is iisnode-inspector-0.7.3.dll. The iisnode-inspector-0.7.3.dll version uses node-inspector-0.7.3 and uses web sockets. Enable web sockets on your Azure webapp to use this version.
Copy file name to clipboardExpand all lines: articles/app-service/quickstart-python.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: 'Quickstart: Deploy a Python web app to Azure App Service'
2
+
title: 'Quickstart: Deploy a Python (Django or Flask) web app to Azure'
3
3
description: Get started with Azure App Service by deploying your first Python app to Azure App Service.
4
4
ms.topic: quickstart
5
5
ms.date: 01/28/2022
@@ -101,7 +101,7 @@ Having issues? [Let us know](https://aka.ms/PythonAppServiceQuickstartFeedback).
101
101
102
102
## 2 - Create a web app in Azure
103
103
104
-
To host your application in Azure, you need to create Azure App Service web app in Azure. You can create a web app using the [Azure portal](https://portal.azure.com/), VS Code using the [Azure Tools extension pack](https://marketplace.visualstudio.com/items?itemName=ms-vscode.vscode-node-azure-pack), or the Azure CLI.
104
+
To host your application in Azure, you need to create Azure App Service web app in Azure. You can create a web app using the [Azure portal](https://portal.azure.com/), [VS Code](https://code.visualstudio.com/) using the [Azure Tools extension pack](https://marketplace.visualstudio.com/items?itemName=ms-vscode.vscode-node-azure-pack), or the Azure CLI.
When the Automation account is successfully created, several resources are automatically created for you. After creation, these runbooks can be safely deleted if you do not wish to keep them. The managed identities can be used to authenticate to your account in a runbook, and should be left unless you create another one or do not require them. The following table summarizes resources for the account.
88
+
When the Automation account is successfully created, several resources are automatically created for you. After creation, these runbooks can be safely deleted if you do not wish to keep them. The managed identities can be used to authenticate to your account in a runbook, and should be left unless you create another one or do not require them. The Automation access keys are also created during Automation account creation. The following table summarizes resources for the account.
89
89
90
90
|Resource |Description |
91
91
|------||------|
@@ -96,6 +96,48 @@ When the Automation account is successfully created, several resources are autom
96
96
> [!NOTE]
97
97
> The tutorial runbooks have not been updated to authenticate using a managed identity. Review the [Using system-assigned identity](enable-managed-identity-for-automation.md#assign-role-to-a-system-assigned-managed-identity) or [Using user-assigned identity](add-user-assigned-identity.md#assign-a-role-to-a-user-assigned-managed-identity) to learn how to grant the managed identity access to resources and configure your runbooks to authenticate using either type of managed identity.
98
98
99
+
## Manage Automation account keys
100
+
101
+
When you create an Automation account, Azure generates two 512-bit automation account access keys for that account. These keys are shared access keys that are used as registration keys for registering [DSC nodes](/azure/automation/automation-dsc-onboarding#use-dsc-metaconfiguration-to-register-hybrid-machines) as well as [Windows](/azure/automation/automation-windows-hrw-install#manual-deployment) and [Linux](/azure/automation/automation-linux-hrw-install#manually-run-powershell-commands) Hybrid runbook workers. These keys are only used while registering DSC nodes and Hybrid workers. Existing machines configured as DSC nodes or hybrid workers won’t be affected after rotation of these keys.
102
+
103
+
### View Automation account keys
104
+
105
+
To view and copy your Automation account access keys, follow these steps:
106
+
1. In the [Azure portal](https://portal.azure.com/), go to your Automation account.
107
+
1. Under **Account Settings**, select **Keys** to view your Automation account's primary and secondary access keys.
108
+
You can use any of the two keys to access your Automation account. However, we recommend that you use the first key and reserve the use of second key.
We recommend that you rotate your access keys periodically to keep the Automation account secure. As you have two access keys, you can rotate them using Azure portal or Azure PowerShell cmdlet.
115
+
116
+
Choose a client
117
+
118
+
# [Azure portal](#tab/azureportal)
119
+
120
+
Follow these steps:
121
+
1. Go to your Automation account in [Azure portal](https://portal.azure.com/).
122
+
1. Under **Account Settings**, select **Keys**.
123
+
1. Select **Regenerate primary** to regenerate the primary access key for your Automation account.
124
+
1. Select the **Regenerate secondary** to regenerate the secondary access key.
Run the [New-AzAutomationKey](/powershell/module/az.automation/new-azautomationkey) command to regenerate the primary access key, as shown in the following example:
The DSC node registers with the State Configuration service using the registration URL and authenticates using a registration access key along with the Automation Account access keys.
138
+
139
+
:::image type="content" source="./media/automation-create-standalone-account/automation-demo-keys-url-inline.png" alt-text="Screenshot of Automation Keys and URL" lightbox="./media/automation-create-standalone-account/automation-demo-keys-url-expanded.png" :::
140
+
99
141
## Next steps
100
142
101
143
* To get started with PowerShell runbooks, see [Tutorial: Create a PowerShell runbook](./learn/powershell-runbook-managed-identity.md).
0 commit comments